If this is your first visit, be sure to
check out the Forum Rules by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

Re: Metasploit auxilary file_autopwn module - Video Tutorial

[[solved]] the PDF I was using to inject was causing the error. and also the LPORT_WIN32 is default to 3333 (the rev shell listen port ) not sure how to pass the "OnlyFiles" actions but whatever..
NICe !

I got no luck with
windows_fileformat_adobe_pdf_embedded_exe_evil.pdf
I tried it locally with BT4 prefinal/svn update and with a different msf host from my site:

I know the windows_fileformat_adobe_pdf_embedded_exe_evil.pdf works so maybe I am missing something it looks as tho it is creating the files fine but I get a DOS box popup with the file_autopwn and nothing in wireshark ?

Re: Metasploit auxilary file_autopwn module - Video Tutorial

Great content. Will have to try it out.

However, the video was extremely frustrating to watch with the video moving so much and missing so much of the scripts being shown and the commands being shown. If it could have just been full screen all the time without it zooming every 20 seconds it would have way more value for the person watching.

However, the video was extremely frustrating to watch with the video moving so much and missing so much of the scripts being shown and the commands being shown. If it could have just been full screen all the time without it zooming every 20 seconds it would have way more value for the person watching.

well, I'm not a big friend of sophisticated videos, nor explaining a step-by-step-i-m-super-l33t-hack$ng-guide; this info should be enough to start with and dive more into the amazing msf3 development...i know I zoomed too many times, but that's why there is a pause button...

/brtw2003

Originally Posted by opreat0r

NICe !

I got no luck with
windows_fileformat_adobe_pdf_embedded_exe_evil.pdf
I tried it locally with BT4 prefinal/svn update and with a different msf host from my site:

I know the windows_fileformat_adobe_pdf_embedded_exe_evil.pdf works so maybe I am missing something it looks as tho it is creating the files fine but I get a DOS box popup with the file_autopwn and nothing in wireshark ?

-does you your /tmp/file.pdf exists (you must use a real pdf document)?
be aware, currently there are also no obfuscation mechanism added, therefore payloads are easily detected by an up-to-date AV (run a simple for loop for all exe files and run msfencode with shikata-ga-nai)

This continues on as it loops through all my file format exploits, when it gets to the end it comes back saying done, found 2 exploit modules, and launches the attack, starts up the folder where I can find vulnerabilities.

I was reading around and it appears this happens if there are too many connections to the database going on at once. I followed your instructions on how to fix an error within metasploit in regards to pools, doing that did not resolve this problem.